Salman Afsar
YOU?
Author Swipe
View article: Exploring the scientific underpinnings of investigating safety signals: analytical insights in deciphering drug safety evidence
Exploring the scientific underpinnings of investigating safety signals: analytical insights in deciphering drug safety evidence Open
Ensuring the safety of drugs is a critical aspect of healthcare. Accurate interpretation of drug safety evidence is vital to understand the safety profile and to evaluate the benefits and risks of the medicinal product. However, validity o…
View article: Navigating a transforming landscape: the evolving role of pharmacovigilance physicians in drug development and implications for future challenges and training requirements
Navigating a transforming landscape: the evolving role of pharmacovigilance physicians in drug development and implications for future challenges and training requirements Open
Contrary to the famous quote from Voltaire, “The art of medicine consists in amusing the patient, while nature cures the disease”, medicine has evolved since the 17th century into a multi-faceted scientific field facilitating healing and i…
View article: Aspects to consider in causality assessment of safety signals: broadening the thought process
Aspects to consider in causality assessment of safety signals: broadening the thought process Open
In the field of drug safety, causality assessment aims to determine the level of plausibility of the relationship between an adverse event and exposure to a particular product. It is after the causality assessment process that we will be a…
View article: Smart E‐Health System for Heart Disease Detection Using Artificial Intelligence and Internet of Things Integrated Next‐Generation Sensor Networks
Smart E‐Health System for Heart Disease Detection Using Artificial Intelligence and Internet of Things Integrated Next‐Generation Sensor Networks Open
According to the World Health Organization, heart disease is the biggest cause of death worldwide. It may be possible to bring down the overall death rate of individuals if cardiovascular disease can be detected in its earlier stages. If t…
View article: Public’s Mental Health Monitoring via Sentimental Analysis of Financial Text Using Machine Learning Techniques
Public’s Mental Health Monitoring via Sentimental Analysis of Financial Text Using Machine Learning Techniques Open
Public feelings and reactions associated with finance are gaining significant importance as they help individuals, public health, financial and non-financial institutions, and the government understand mental health, the impact of policies…
View article: Fagan Inspection: A Defects Finding Mechanism in Software Requirements Specification (SRS) Document
Fagan Inspection: A Defects Finding Mechanism in Software Requirements Specification (SRS) Document Open
The preparation of Software Requirement Specification (SRS) document is a critical task as the successful completion of software depends heavely upon the SRS. The requirements gathering phase in Software Development Life Cycle SDLC is equa…
View article: VANET routing Protocols :Implementation and Analysis Using NS3 and SUMO
VANET routing Protocols :Implementation and Analysis Using NS3 and SUMO Open
The emerging new form of mobile adhoc network VANETNetwork is exemplifiedby fast and drastic changes in topology over a shorter period of time. These two features have a significant impact on the efficiency ofrouting protocols used in thes…
View article: An Improved Methodology for Data Hiding In Images Using Haar Transformed, LSB Replacement Method and Modified PVDMF 1
An Improved Methodology for Data Hiding In Images Using Haar Transformed, LSB Replacement Method and Modified PVDMF 1 Open
Steganography is a technique of concealing secret text or image within another image.In this paper, abetterand efficient steganography methodfor hiding imagesand/or text into a color image is proposed. The proposed techniqueis based on two…
View article: Key Benefits of Cloud-Based Internet of Vehicle (IoV)-Enabled Fleet Weight Management System
Key Benefits of Cloud-Based Internet of Vehicle (IoV)-Enabled Fleet Weight Management System Open
The fleet industry is flourishing at extreme levels with a wide acceptance of IoV-powered methods in various verticals. Fuel consumption, tire pressure readings, driver’s driving habits, cargo monitoring, load measurement, and many other a…
View article: An Analysis on Object Recognition Using Convolutional Neural Networks
An Analysis on Object Recognition Using Convolutional Neural Networks Open
The global development and progress in scientific paraphernalia and technology is the fundamental reason for the rapid increasein the data volume. Several significant techniques have been introducedfor image processing and object detection…
View article: Threshold-Sensitive Energy Efficient Network and Low Energy Adaptive Clustering Hierarchy Protocols’ Performance Appraisal in Wireless Sensor Networks
Threshold-Sensitive Energy Efficient Network and Low Energy Adaptive Clustering Hierarchy Protocols’ Performance Appraisal in Wireless Sensor Networks Open
Due to the inability of being frequently charged the sensor nodes in the WSN in non-accessible milieu is the main concern of enhancing battery lifetime.And for its WSN protocols play a pivotal role.Effectiveness of wireless sensor networks…
View article: Security Experts Innovation and Investment Front for IT-Entrepreneurship in Pakistan
Security Experts Innovation and Investment Front for IT-Entrepreneurship in Pakistan Open
Innovation in the field of entrepreneurship is the subject of this study.It lacks in Pakistanas compared to other regions like India, Malaysia and China.In this explanatory as well as exploratory study, the issue has been highlighted in it…
View article: ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING
ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING Open
The inference for this research was concentrated on client’s data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible prepa…
View article: IoT based real time agriculture farming
IoT based real time agriculture farming Open
The Internet of things (IOT) is remodeling the agribusiness empowering the agriculturists through the extensive range of strategies, for example, accuracy as well as practical farming to deal with challenges in the field. The paper aims ma…
View article: RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY
RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY Open
Radio Frequency Identification (RFID) skill is becoming a technology that might deliver a response to manual glitches. The use of tags, receiver and wireless surfs to join with each other would mean that RFID in combination with the EPC wo…
View article: Climate Modeling System with Adaptation of Neural Network and AI Data Mining Techniques
Climate Modeling System with Adaptation of Neural Network and AI Data Mining Techniques Open
The purpose of this study is to develop a climate modeling system by using data mining techniques which are the process of extracting needed information's from the large database.Thus, the fetching information can be used into practical kn…
View article: Cost Effective Data Center and its Implementation in Industry
Cost Effective Data Center and its Implementation in Industry Open
A data Centre is a dedicated space where companies can keep and operate most of the ICT infrastructure that supports their business.A server cultivate much of the time requires expansive redundant or fortification control supply structures…
View article: Optimization of Test Case Generation using Genetic Algorithm (GA)
Optimization of Test Case Generation using Genetic Algorithm (GA) Open
Testing provides means pertaining to assuring software performance. The total\naim of software industry is actually to make a certain start associated with\nhigh quality software for the end user. However, associated with software\ntesting…